What Did Evan Tangeman Admit to in the Crypto Theft Case?
Evan Tangeman, a 22-year-old California resident, was sentenced on Friday to 70 months in prison for his role in a criminal group that stole about $263 million in cryptocurrencies through social engineering scams and burglary.
Tangeman pleaded guilty in December 2025 and admitted to helping members of the group launder at least $3.5 million in illicit funds, according to the US Department of Justice. He also received 3 years of supervised release.
The case shows how crypto theft groups are mixing online manipulation with physical crime, using account takeovers, deception, burglary, and laundering networks to move stolen assets.
How Did Prosecutors Describe the Scheme?
US officials described the operation as a criminal enterprise built around theft, laundering, and luxury spending. Prosecutors said stolen crypto proceeds were used for high-end purchases and large entertainment expenses.
“This criminal enterprise was built on greed so brazen it borders on the cartoonish. They stole millions, spent it on half-million-dollar nightclub tabs, Lamborghinis, and Rolexes,” Jeanine Pirro, the US attorney for the District of Columbia, said.
She added: “Evan Tangeman didn’t just launder the money that fueled that lifestyle. When his co-conspirators were arrested, he moved to destroy the evidence. That is consciousness of guilt, and this office and the court have treated that accordingly.”
Investor Takeaway
Why Are Social Engineering Attacks a Growing Crypto Risk?
The sentence comes as losses from crypto scams and hacks reached $482 million in Q1 2026, with criminal groups increasingly targeting users through online social engineering and physical attacks.
Social engineering remains one of the most damaging attack methods because it targets the user rather than the protocol. Criminals can gain access through impersonation, phishing, SIM swaps, fake support channels, or pressure tactics that push victims to approve transactions or disclose sensitive information.
Once funds are transferred onchain, recovery is difficult. Even when authorities trace wallet flows, stolen assets may pass through mixers, bridges, OTC brokers, or accounts controlled by money mules before enforcement teams can freeze them.
Investor Takeaway
How Are Physical Attacks Changing the Threat Model?
The case also fits a wider rise in physical attacks on crypto users. In France, Telegram co-founder Pavel Durov said the country recorded 41 kidnappings of crypto holders in Q1 2026 alone.
Durov linked the rise in violent theft to tax data leaks that allegedly exposed the identities and holdings of crypto users. He accused French officials of selling tax data to organized criminals, though those claims remain politically explosive and would require official investigation.
For crypto investors, the broader lesson is clear: public exposure of holdings can create direct personal risk. Wealth tied to bearer assets is different from banked wealth because access to private keys or recovery phrases can become the target.
As criminal methods become more aggressive, crypto security is no longer limited to passwords, wallets, and exchange controls. It now includes privacy discipline, physical safety, legal reporting, and careful handling of personal financial data.
